Microsoft Word has been subjected to the Zero-Day exploit by exploiting documents using the Rich Text Format (RTF), which can exploit a vulnerability in Microsoft Word 2010.
“Microsoft is aware of a vulnerability affecting supported versions of Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010,” said Microsoft in a note on its Security TechCenter on Monday.
The exploit may “allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer,” Microsoft said.
It continues: “An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Applying the Microsoft Fix it solution, ‘Disable opening RTF content in Microsoft Word,’ prevents the exploitation of this issue through Microsoft Word. See the Suggested Actions section of this advisory for more information.”
The warning credited Drew Hintz, Shane Huntley, and Matty Pellegrino with Google for finding the RTF security problem. The bug was cataloged as CVE-2014-1761.
Microsoft issued a temporary fix on its Support website, which can be found here.
Microsoft did not elaborate on who was being targeted by the Word attacks.
“The vulnerability is a remote code execution vulnerability. The issue is caused when Microsoft Word parses specially crafted RTF-formatted data causing system memory to become corrupted in such a way that an attacker could execute arbitrary code,” Microsoft said.
“The vulnerability could be exploited through Microsoft Outlook only when using Microsoft Word as the email viewer. Note that by default, Microsoft Word is the email reader in Microsoft Outlook 2007, Microsoft Outlook 2010, and Microsoft Outlook 2013. On completion of investigation for this vulnerability, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.”